HOFESAC VizSec ‘13
HOFESAC
holistic operational framework for establishing situational awareness in cyberspace
- W. Clay Moody
Clemson University Supporting work by Judson Dressler, Calvert L. Bowen III, and Jason Koepke
HOFESAC holistic operational framework for establishing situational - - PowerPoint PPT Presentation
HOFESAC VizSec 13 HOFESAC holistic operational framework for establishing situational awareness in cyberspace W. Clay Moody Clemson University Supporting work by Judson Dressler, Calvert L. Bowen III, and Jason Koepke HOFESAC Disclaimer
HOFESAC VizSec ‘13
holistic operational framework for establishing situational awareness in cyberspace
Clemson University Supporting work by Judson Dressler, Calvert L. Bowen III, and Jason Koepke
HOFESAC VizSec ‘13
presentation are those of the authors and do not necessarily reflect those of Clemson University, the United States Military Academy, United States Cyber Command, or the United States Army
pre-publication review by various offices of the United States Government
HOFESAC VizSec ‘13
HOFESAC VizSec ‘13
Courtesy of xkcd.com Creative Commons Attribution-NonCommercial 2.5 License.
HOFESAC VizSec ‘13
Energy Finance Transportation Defense
damages ability to defend the nation
to secure the nation
HOFESAC VizSec ‘13
we are losing. It's that simple. As the most wired nation on Earth, we offer the most targets of significance, yet our cyber-defenses are woefully lacking.”
– Former Director of the NSA, Mike McConnell – Washington Post Feb 2010
decision in exercising operational control over them ... will require much greater situational awareness and real-time visibility of intrusions into our networks.”
– Commander, United States Cyber Command (USCYBERCOM) and current Director of the NSA General Keith Alexander – Congressional Testimony 2010
Pictures – Courtesy of Wikipedia : Emphasis added
HOFESAC VizSec ‘13
domain (with land, sea, air, and space)
awareness” for DoD
was removed in 2011 “Knowledge and understanding of the
conditions, to include the status of friendly and adversary forces, neutrals and noncombatants, weather and terrain, that enables timely, relevant, comprehensive, and accurate assessments, in order to successfully apply combat power, protect the force, and/or complete the mission”
HOFESAC VizSec ‘13
understanding while continuously taking action or making operational risk decisions
– Identify decisions and actions – Identify and access appropriate data – Build analytic tools for data – Visualize data for decision makers
HOFESAC VizSec ‘13
Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations
CSA
Information from all six data classes must be fused, correlated, analyzed, and visualized in near real time for optimal Cyber Situational Awareness
HOFESAC VizSec ‘13
aligning preemptive actions
HOFESAC VizSec ‘13
detect anomalous activity
needed to identify anomalies
HOFESAC VizSec ‘13
systems
rapidly for security
vulnerabilities exist in your system
system for vulnerabilities
HOFESAC VizSec ‘13
geographically-dispersed systems
impractical
systems
and technical risk
HOFESAC VizSec ‘13
forces and assets
– Readiness of its tools and capabilities – Training and availability of its operators – Integrity of network sensors, paths and systems
HOFESAC VizSec ‘13
must be considered
timeframes
HOFESAC VizSec ‘13
from all six classes
decisions the closer they are to the intersection of all six classes
additional classes of information are considered
HOFESAC VizSec ‘13
accomplish a specific task
continuous flow of logistics and personnel into area of
HOFESAC VizSec ‘13
JTF Operations
Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations
CSA
HOFESAC VizSec ‘13
System as key cyber terrain
– Unclassified system on Internet, connects to commercial shipping and airflow systems
and require maintenance scheduled in two months
attending commercial certification training in US
HOFESAC VizSec ‘13
Logistical System Degraded Network Sensors CYBER UNIT AT TRAINING JTF Operations
Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations
CSA
HOFESAC VizSec ‘13
discovered
required testing with legacy OS
to implant of malicious software on unpatched systems
this time
HOFESAC VizSec ‘13
Unpatched Root Level Access, Allows Malware Implant Logistical System Degraded Network Sensors Cyber Unit At Training JTF Operations
Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations
CSA
HOFESAC VizSec ‘13
increased interest in disrupting and influencing logistical flow
from training and refocus on monitoring the logistics systems
HOFESAC VizSec ‘13
Adversary Increased Interest in Disrupting Logistics, Employs Trojan horse tactics Logistical System Degraded Network Sensors Cyber Unit At Training JTF Operations
Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations
CSA
Unpatched Root Level Access, Allows Malware Implant
HOFESAC VizSec ‘13
logistical support systems
irregular sized traffic over the same TCP port to and IP subnet outside of the US
slowly exfiltrated over covert channels
HOFESAC VizSec ‘13
Irregular TCP transmissions to non-US IP space
Adversary Increased Interest In Disrupting Logistics, Employs Trojan Horse Tactics Logistical System Degraded network sensors Cyber unit at training JTF Operations
Threat Environment Anomalous Activity Vulnerabilities Key Terrain Operational Readiness Ongoing Operations
CSA
Unpatched Root Level Access, Allows Malware Implant
HOFESAC VizSec ‘13
stolen to assess operational impact
personnel movements
HOFESAC VizSec ‘13
– All SA classes have abundant information – Data is available for consumption by integrated systems or motivated individual
– Cyber forces don’t concern themselves with ongoing operations – Commanders don’t understand cyber key terrain – Operational Readiness of cyber forces not understood – Vulnerability, threat, and anomalous activity is presented as technical jargon to decision makers
HOFESAC VizSec ‘13
be collected, analyzed, and displayed to user in timely and relevant manner
technical challenges
HOFESAC VizSec ‘13
– Humiliation in revealing security flaw – Losing a competitive edge or public confidence – Creation of “1,000 mile screwdriver” from higher
aggregate data for analysis
HOFESAC VizSec ‘13
Challenge 2: Data Consolidation / Normalization
network bandwidth
thresholds
to standardized formats
HOFESAC VizSec ‘13
advanced processing algorithms
separated network
HOFESAC VizSec ‘13
to-machine detection
presentation of data
information to right user within proper authorities and permissions
HOFESAC VizSec ‘13
accuracy hamper timely response
delivered in a timely fashion
HOFESAC VizSec ‘13
environment is absolutely critical to cyber defense operations
information from six data classes
incorporate cyberspace into decision making process
HOFESAC VizSec ‘13
Acknowledgements: Thanks to Judd Dressler, Triiip Bowen, Jason Koepke, Rob Schrier and Greg Conti